Check it out: Everything is a little easier when you have a list of steps to help you accomplish your objective. Here are some things you can do
As soon as you learn you've been hacked
Contact your email provider.
Most email providers have support centers where you can get help. Here are some common providers’ resource sites:
Consider installing antivirus software.
Software industry publications such as ComputerWorld provide a number of well known options for your consideration.
Scan for and remove any malware.
Malware—software designed to disrupt, damage, or gain unauthorized access to a computer system—can allow someone to access files on your computer or reroute the website you land on from a legitimate one you enter to a fake one. Use the scanning feature in your chosen anti-virus software and then delete any malware it finds.
Update your operating system software.
Use the most current version, which will have the most recent patches and bug protections incorporated. Make it a practice to accept automatic updates or at least do a quick version check once a month.
Once you get access to your account
Change your passwords from a computer you’re confident hasn’t been compromised.
Make sure your new password combines letters, numbers, and characters.
Enable Two-Factor authentication whenever it’s offered.
With this method, you get a call or text message after you enter your password and before you get access to your account. If someone else attempts to get into your account, you’ll be the one seeing—and denying—the verification message.
Look through your sent email list.
Check whether (and what) information may have been sent to a party you don’t recognize. Also, see if your contacts received a message you didn’t send.
Review your account settings.
The Federal Trade Commission (FTC) recommends you confirm your messages aren’t being forwarded to another email address, as well as check your email signature and automatic reply settings for unfamiliar links.
Warn your contacts.
Tell those in your e-mail address book not to respond to unexpected requests for aid or click on any links they might get from you. You can use email once you regain control of your account. A quick phone call to those you’re closest with can’t hurt either.
Working with Janney
For more information about Janney, please see Janney’s Relationship Summary (Form CRS) on www.janney.com/crs which details all material facts about the scope and terms of our relationship with you and any potential conflicts of interest.
Get the benefit of convenient, timely access to your accounts with Janney Online Access. Checking your portfolio and financial plan progress is easy when you use Online Access. Transfer funds, store documents including wills and power-of-attorney permissions in a central Document Vault, and manage your eDelivery notice preferences.
Janney Montgomery Scott LLC, its affiliates, and its employees are not in the business of providing tax, regulatory, accounting, or legal advice. These materials and any tax-related statements are not intended or written to be used, and cannot be used or relied upon, by any taxpayer for the purpose of avoiding tax penalties. Any such taxpayer should seek advice based on the taxpayer’s particular circumstances from an independent tax advisor.
Cash & Borrowing
Here’s What You Can Do to Prevent Check FraudInstances of check fraud are on the rise in the U.S. Below are some best practices to help you av...
Data & Cybersecurity
Recover From a System HackHere is a checklist of steps to help you recover from a computer system hack.
Data & Cybersecurity
Prevent Phishing AttacksPhishing scams are growing more sophisticated. Here is a checklist of things to do to recognize a...